Search form

censorship

Software tools that bypass censorship and surveillance, also known as circumvention technology, are used in variety of contexts. Chinese citizens get around the Great Firewall to access censored sites and popular international social media platforms. Activists in Iran bypass government surveillance... Read more

Last week, there were some rumors that a few rather high-profile sites were considering taking down their sites, possibly in conjunction with SOPA and PIPA returning to Congress January 23 and 24. Within a day, the rumors were denied. Today, however, several have stepped up to say there will be... Read more

Today the House Judiciary Committee spent four hours debating HR 3261, the Stop Online Piracy Act, better known as SOPA, despite early successes of momentum against it. No vote was taken.
Yesterday, many of those those who get their news from newspapers saw an ad taken out in major papers around... Read more

Banned Books Week, held the last week of September each year since 1982, is an opportunity for libraries and bookstores to draw attention to censorship with challenged books. In the 29 years since the first Banned Books Week, more than 11,000 books have been challenged, including 348 reported to... Read more

Last week, the Slovak Ministry of Finance proposed a revision of communication law by extending it to create a list of websites to be banned by all Slovak Internet service providers (ISPs). Even more disturbing, this list would be maintained by the tax office in Bratislava, a governmental office.... Read more

Main menu

The opinions expressed on this website are those of each author, not of the author's employer or of Red Hat.

Opensource.com aspires to publish all content under a Creative Commons license but may not be able to do so in all cases. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. Red Hat and the Shadowman logo are trademarks of Red Hat, Inc., registered in the United States and other countries.